Applying a security architecture with key management framework to the delay/disruption tolerant networks

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Recently, one of the growing hot topics in the field of wireless network is to enable of Delay/Disruption Tolerant Networking (DTN). It aims to solve the long delay paths and unpredictable link disruptions that occur in the challenged networks. In order to maintain a safe and secure DTN model, a secure way of key distribution would be required to provide robustness from all the attacks it suffers. This paper proposes a clear and illustrative security architecture for DTN with secure key management framework to distribute the cryptographic keys to the constituted nodes in a secure way. The performance of how the cryptographic keys work and perform during a node is departed away from the network are discussed. The distributed keys use the public key cryptography to mitigate during the network attacks. Along with the key management protocol, some degree of security features can be achieved with the bundle of security protocol to rescue the network model from any attacks.

References Powered by Scopus

DTN: An architectural retrospective

423Citations
N/AReaders
Get full text

Security analysis of DTN architecture and bundle protocol specification for space-based networks

25Citations
N/AReaders
Get full text

Security analysis for delay/disruption tolerant satellite and sensor networks

24Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A taxonomy on misbehaving nodes in delay tolerant networks

33Citations
N/AReaders
Get full text

Cryptographic key management in delay tolerant networks: A survey

18Citations
N/AReaders
Get full text

FRID: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks

9Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Rajan, G., & Cho, G. (2015). Applying a security architecture with key management framework to the delay/disruption tolerant networks. International Journal of Security and Its Applications, 9(4), 327–336. https://doi.org/10.14257/ijsia.2015.9.4.30

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

100%

Readers' Discipline

Tooltip

Computer Science 1

33%

Social Sciences 1

33%

Engineering 1

33%

Save time finding and organizing research with Mendeley

Sign up for free